Cryptography and Data Security Based on Information Theory
A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".
Deadline for manuscript submissions: closed (30 July 2024) | Viewed by 8007
Special Issue Editor
Interests: elliptic curve cryptography; pairing-based cryptography; elliptic curve discrete logarithm problem; finite field theory and its applications; Internet of Things
Special Issue Information
Computer science, mathematics, and communication theory are a few axes of information theory. In computer science, cryptography refers to the art of using mathematics and science for secure communication, as well as being the foundation for privacy and communication security. Basically, the security of any cryptographic system can rely either on the computational infeasibility of breaking it, or on the theoretical impossibility of breaking it (even using infinite computational power), which is called information theoretic security. Recently, researchers have become more interested in the latter approach, whereas computational security relies on an unproven intractability assumption and is less practical. Information theory has several typical applications in cryptography, such as allowing us to prove the unconditional security of cryptographic systems and acting as a crucial tool in reduction proofs, showing that breaking a cryptographic system is as hard as breaking an underlying cryptographic primitive. Thus, information theory and cryptographic systems are inseparable topics in security research areas, offering a wide range of research themes.
Cryptographic protocols and systems depend on cryptographic primitives and associated algorithms as their basic building blocks. A few common examples of such primitives are digital signatures, one-way hash functions, ciphers, secret sharing, and public key cryptography, although the terminology ‘primitive’ may vary depending on the point of view. Besides this, the popularity of clouds for providing various services has continued to grow at a rapid pace. Cloud storage enables users to store their sensitive data and exchange it with others. In spite of the advantages, security is the most relevant and crucial matter in the widespread adoption of cloud-based services, as well as in network and IoT security. Regardless of the advances in this research area, important research problems still remain open; for instance, blockchain is receiving serious attention.
The aim of this Special Issue is to invite researchers to share their recent progress in cryptography and security research areas, addressing both theoretical and practical aspects.
Prof. Dr. Yasuyuki Nogami
Guest Editor
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- cryptographic primitives
- protocol security
- cloud security
- network security
- advanced cryptography
- IoT security
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.
Further information on MDPI's Special Issue polices can be found here.